Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2023, 15:42
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
322afa5ba5f1f8d7d9213ac40e6da9a7_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
322afa5ba5f1f8d7d9213ac40e6da9a7_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
322afa5ba5f1f8d7d9213ac40e6da9a7_mafia_JC.exe
-
Size
488KB
-
MD5
322afa5ba5f1f8d7d9213ac40e6da9a7
-
SHA1
081da93184d533b0330ee5d73814ea6ebd55094c
-
SHA256
94feb9000dcc7c77f990e208aef26f0dd9f8867b64993ceb01eeea57213b6ffc
-
SHA512
b31fc5edb107c9ebca8a3d2ebb1b9279d26823b5102677d7df7f39522c3d1b5a40f5933ef222177d6e9a71bfdef2cf2c54f1812db18eef343ba5268f6deb6732
-
SSDEEP
12288:/U5rCOTeiDchimFLDLKNPWAWDl+4tiH5jNZ:/UQOJDcHhfKBWZlVti5jN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3660 AF5A.tmp 2136 B026.tmp 4836 B0F1.tmp 3316 B1DB.tmp 3908 B2A6.tmp 244 B371.tmp 8 B45C.tmp 3704 B536.tmp 4868 B611.tmp 4120 B6DC.tmp 3968 B798.tmp 1800 B873.tmp 1280 B94D.tmp 2100 B9DA.tmp 4224 BB41.tmp 3260 BC5B.tmp 3336 BCD8.tmp 1204 BD83.tmp 1152 BE3F.tmp 3956 BF29.tmp 4524 BFD5.tmp 3844 C071.tmp 1520 C14C.tmp 2236 C217.tmp 4464 C2F2.tmp 4972 C3DC.tmp 1996 C4B7.tmp 4368 C553.tmp 2960 C60F.tmp 5064 C6BB.tmp 4736 C776.tmp 1760 C841.tmp 4988 C94B.tmp 4420 C9C8.tmp 2784 CA74.tmp 3668 CB2F.tmp 1076 CBCC.tmp 3000 CC68.tmp 3920 CD04.tmp 4872 CDA0.tmp 3724 CE4C.tmp 2068 D011.tmp 1144 D08E.tmp 3656 D12B.tmp 3756 D1A8.tmp 928 D254.tmp 3364 D2D1.tmp 4048 D37C.tmp 1700 D486.tmp 4624 D551.tmp 1776 D5ED.tmp 2088 D66A.tmp 672 D716.tmp 548 D7A3.tmp 3864 D87E.tmp 4404 D8FB.tmp 660 D9C6.tmp 972 DA62.tmp 4592 DADF.tmp 2396 DB6C.tmp 4520 DBD9.tmp 1032 DC75.tmp 2988 DD21.tmp 1956 DD8F.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4404 wrote to memory of 3660 4404 322afa5ba5f1f8d7d9213ac40e6da9a7_mafia_JC.exe 80 PID 4404 wrote to memory of 3660 4404 322afa5ba5f1f8d7d9213ac40e6da9a7_mafia_JC.exe 80 PID 4404 wrote to memory of 3660 4404 322afa5ba5f1f8d7d9213ac40e6da9a7_mafia_JC.exe 80 PID 3660 wrote to memory of 2136 3660 AF5A.tmp 81 PID 3660 wrote to memory of 2136 3660 AF5A.tmp 81 PID 3660 wrote to memory of 2136 3660 AF5A.tmp 81 PID 2136 wrote to memory of 4836 2136 B026.tmp 82 PID 2136 wrote to memory of 4836 2136 B026.tmp 82 PID 2136 wrote to memory of 4836 2136 B026.tmp 82 PID 4836 wrote to memory of 3316 4836 B0F1.tmp 83 PID 4836 wrote to memory of 3316 4836 B0F1.tmp 83 PID 4836 wrote to memory of 3316 4836 B0F1.tmp 83 PID 3316 wrote to memory of 3908 3316 B1DB.tmp 84 PID 3316 wrote to memory of 3908 3316 B1DB.tmp 84 PID 3316 wrote to memory of 3908 3316 B1DB.tmp 84 PID 3908 wrote to memory of 244 3908 B2A6.tmp 85 PID 3908 wrote to memory of 244 3908 B2A6.tmp 85 PID 3908 wrote to memory of 244 3908 B2A6.tmp 85 PID 244 wrote to memory of 8 244 B371.tmp 86 PID 244 wrote to memory of 8 244 B371.tmp 86 PID 244 wrote to memory of 8 244 B371.tmp 86 PID 8 wrote to memory of 3704 8 B45C.tmp 87 PID 8 wrote to memory of 3704 8 B45C.tmp 87 PID 8 wrote to memory of 3704 8 B45C.tmp 87 PID 3704 wrote to memory of 4868 3704 B536.tmp 88 PID 3704 wrote to memory of 4868 3704 B536.tmp 88 PID 3704 wrote to memory of 4868 3704 B536.tmp 88 PID 4868 wrote to memory of 4120 4868 B611.tmp 89 PID 4868 wrote to memory of 4120 4868 B611.tmp 89 PID 4868 wrote to memory of 4120 4868 B611.tmp 89 PID 4120 wrote to memory of 3968 4120 B6DC.tmp 90 PID 4120 wrote to memory of 3968 4120 B6DC.tmp 90 PID 4120 wrote to memory of 3968 4120 B6DC.tmp 90 PID 3968 wrote to memory of 1800 3968 B798.tmp 92 PID 3968 wrote to memory of 1800 3968 B798.tmp 92 PID 3968 wrote to memory of 1800 3968 B798.tmp 92 PID 1800 wrote to memory of 1280 1800 B873.tmp 93 PID 1800 wrote to memory of 1280 1800 B873.tmp 93 PID 1800 wrote to memory of 1280 1800 B873.tmp 93 PID 1280 wrote to memory of 2100 1280 B94D.tmp 94 PID 1280 wrote to memory of 2100 1280 B94D.tmp 94 PID 1280 wrote to memory of 2100 1280 B94D.tmp 94 PID 2100 wrote to memory of 4224 2100 B9DA.tmp 95 PID 2100 wrote to memory of 4224 2100 B9DA.tmp 95 PID 2100 wrote to memory of 4224 2100 B9DA.tmp 95 PID 4224 wrote to memory of 3260 4224 BB41.tmp 96 PID 4224 wrote to memory of 3260 4224 BB41.tmp 96 PID 4224 wrote to memory of 3260 4224 BB41.tmp 96 PID 3260 wrote to memory of 3336 3260 BC5B.tmp 97 PID 3260 wrote to memory of 3336 3260 BC5B.tmp 97 PID 3260 wrote to memory of 3336 3260 BC5B.tmp 97 PID 3336 wrote to memory of 1204 3336 BCD8.tmp 98 PID 3336 wrote to memory of 1204 3336 BCD8.tmp 98 PID 3336 wrote to memory of 1204 3336 BCD8.tmp 98 PID 1204 wrote to memory of 1152 1204 BD83.tmp 99 PID 1204 wrote to memory of 1152 1204 BD83.tmp 99 PID 1204 wrote to memory of 1152 1204 BD83.tmp 99 PID 1152 wrote to memory of 3956 1152 BE3F.tmp 100 PID 1152 wrote to memory of 3956 1152 BE3F.tmp 100 PID 1152 wrote to memory of 3956 1152 BE3F.tmp 100 PID 3956 wrote to memory of 4524 3956 BF29.tmp 103 PID 3956 wrote to memory of 4524 3956 BF29.tmp 103 PID 3956 wrote to memory of 4524 3956 BF29.tmp 103 PID 4524 wrote to memory of 3844 4524 BFD5.tmp 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\322afa5ba5f1f8d7d9213ac40e6da9a7_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\322afa5ba5f1f8d7d9213ac40e6da9a7_mafia_JC.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\AF5A.tmp"C:\Users\Admin\AppData\Local\Temp\AF5A.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\B026.tmp"C:\Users\Admin\AppData\Local\Temp\B026.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\B0F1.tmp"C:\Users\Admin\AppData\Local\Temp\B0F1.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\B1DB.tmp"C:\Users\Admin\AppData\Local\Temp\B1DB.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"C:\Users\Admin\AppData\Local\Temp\B2A6.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\B371.tmp"C:\Users\Admin\AppData\Local\Temp\B371.tmp"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Users\Admin\AppData\Local\Temp\B45C.tmp"C:\Users\Admin\AppData\Local\Temp\B45C.tmp"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\B536.tmp"C:\Users\Admin\AppData\Local\Temp\B536.tmp"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\B611.tmp"C:\Users\Admin\AppData\Local\Temp\B611.tmp"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"C:\Users\Admin\AppData\Local\Temp\B6DC.tmp"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\B798.tmp"C:\Users\Admin\AppData\Local\Temp\B798.tmp"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\B873.tmp"C:\Users\Admin\AppData\Local\Temp\B873.tmp"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\B94D.tmp"C:\Users\Admin\AppData\Local\Temp\B94D.tmp"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\B9DA.tmp"C:\Users\Admin\AppData\Local\Temp\B9DA.tmp"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\BB41.tmp"C:\Users\Admin\AppData\Local\Temp\BB41.tmp"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\BC5B.tmp"C:\Users\Admin\AppData\Local\Temp\BC5B.tmp"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"C:\Users\Admin\AppData\Local\Temp\BCD8.tmp"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\BD83.tmp"C:\Users\Admin\AppData\Local\Temp\BD83.tmp"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\BE3F.tmp"C:\Users\Admin\AppData\Local\Temp\BE3F.tmp"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\BF29.tmp"C:\Users\Admin\AppData\Local\Temp\BF29.tmp"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"C:\Users\Admin\AppData\Local\Temp\BFD5.tmp"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\C071.tmp"C:\Users\Admin\AppData\Local\Temp\C071.tmp"23⤵
- Executes dropped EXE
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\C14C.tmp"C:\Users\Admin\AppData\Local\Temp\C14C.tmp"24⤵
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\C217.tmp"C:\Users\Admin\AppData\Local\Temp\C217.tmp"25⤵
- Executes dropped EXE
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\C2F2.tmp"C:\Users\Admin\AppData\Local\Temp\C2F2.tmp"26⤵
- Executes dropped EXE
PID:4464 -
C:\Users\Admin\AppData\Local\Temp\C3DC.tmp"C:\Users\Admin\AppData\Local\Temp\C3DC.tmp"27⤵
- Executes dropped EXE
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\C4B7.tmp"C:\Users\Admin\AppData\Local\Temp\C4B7.tmp"28⤵
- Executes dropped EXE
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\C553.tmp"C:\Users\Admin\AppData\Local\Temp\C553.tmp"29⤵
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\C60F.tmp"C:\Users\Admin\AppData\Local\Temp\C60F.tmp"30⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\C6BB.tmp"C:\Users\Admin\AppData\Local\Temp\C6BB.tmp"31⤵
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\C776.tmp"C:\Users\Admin\AppData\Local\Temp\C776.tmp"32⤵
- Executes dropped EXE
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\C841.tmp"C:\Users\Admin\AppData\Local\Temp\C841.tmp"33⤵
- Executes dropped EXE
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\C94B.tmp"C:\Users\Admin\AppData\Local\Temp\C94B.tmp"34⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\C9C8.tmp"C:\Users\Admin\AppData\Local\Temp\C9C8.tmp"35⤵
- Executes dropped EXE
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\CA74.tmp"C:\Users\Admin\AppData\Local\Temp\CA74.tmp"36⤵
- Executes dropped EXE
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\CB2F.tmp"C:\Users\Admin\AppData\Local\Temp\CB2F.tmp"37⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\CBCC.tmp"C:\Users\Admin\AppData\Local\Temp\CBCC.tmp"38⤵
- Executes dropped EXE
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\CC68.tmp"C:\Users\Admin\AppData\Local\Temp\CC68.tmp"39⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\CD04.tmp"C:\Users\Admin\AppData\Local\Temp\CD04.tmp"40⤵
- Executes dropped EXE
PID:3920 -
C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"C:\Users\Admin\AppData\Local\Temp\CDA0.tmp"41⤵
- Executes dropped EXE
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\CE4C.tmp"C:\Users\Admin\AppData\Local\Temp\CE4C.tmp"42⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\D011.tmp"C:\Users\Admin\AppData\Local\Temp\D011.tmp"43⤵
- Executes dropped EXE
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\D08E.tmp"C:\Users\Admin\AppData\Local\Temp\D08E.tmp"44⤵
- Executes dropped EXE
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\D12B.tmp"C:\Users\Admin\AppData\Local\Temp\D12B.tmp"45⤵
- Executes dropped EXE
PID:3656 -
C:\Users\Admin\AppData\Local\Temp\D1A8.tmp"C:\Users\Admin\AppData\Local\Temp\D1A8.tmp"46⤵
- Executes dropped EXE
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\D254.tmp"C:\Users\Admin\AppData\Local\Temp\D254.tmp"47⤵
- Executes dropped EXE
PID:928 -
C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"C:\Users\Admin\AppData\Local\Temp\D2D1.tmp"48⤵
- Executes dropped EXE
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\D37C.tmp"C:\Users\Admin\AppData\Local\Temp\D37C.tmp"49⤵
- Executes dropped EXE
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\D486.tmp"C:\Users\Admin\AppData\Local\Temp\D486.tmp"50⤵
- Executes dropped EXE
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\D551.tmp"C:\Users\Admin\AppData\Local\Temp\D551.tmp"51⤵
- Executes dropped EXE
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\D5ED.tmp"C:\Users\Admin\AppData\Local\Temp\D5ED.tmp"52⤵
- Executes dropped EXE
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\D66A.tmp"C:\Users\Admin\AppData\Local\Temp\D66A.tmp"53⤵
- Executes dropped EXE
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\D716.tmp"C:\Users\Admin\AppData\Local\Temp\D716.tmp"54⤵
- Executes dropped EXE
PID:672 -
C:\Users\Admin\AppData\Local\Temp\D7A3.tmp"C:\Users\Admin\AppData\Local\Temp\D7A3.tmp"55⤵
- Executes dropped EXE
PID:548 -
C:\Users\Admin\AppData\Local\Temp\D87E.tmp"C:\Users\Admin\AppData\Local\Temp\D87E.tmp"56⤵
- Executes dropped EXE
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\D8FB.tmp"C:\Users\Admin\AppData\Local\Temp\D8FB.tmp"57⤵
- Executes dropped EXE
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\D9C6.tmp"C:\Users\Admin\AppData\Local\Temp\D9C6.tmp"58⤵
- Executes dropped EXE
PID:660 -
C:\Users\Admin\AppData\Local\Temp\DA62.tmp"C:\Users\Admin\AppData\Local\Temp\DA62.tmp"59⤵
- Executes dropped EXE
PID:972 -
C:\Users\Admin\AppData\Local\Temp\DADF.tmp"C:\Users\Admin\AppData\Local\Temp\DADF.tmp"60⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\DB6C.tmp"C:\Users\Admin\AppData\Local\Temp\DB6C.tmp"61⤵
- Executes dropped EXE
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\DBD9.tmp"C:\Users\Admin\AppData\Local\Temp\DBD9.tmp"62⤵
- Executes dropped EXE
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\DC75.tmp"C:\Users\Admin\AppData\Local\Temp\DC75.tmp"63⤵
- Executes dropped EXE
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\DD21.tmp"C:\Users\Admin\AppData\Local\Temp\DD21.tmp"64⤵
- Executes dropped EXE
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\DD8F.tmp"C:\Users\Admin\AppData\Local\Temp\DD8F.tmp"65⤵
- Executes dropped EXE
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"C:\Users\Admin\AppData\Local\Temp\DE4A.tmp"66⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\DEC7.tmp"C:\Users\Admin\AppData\Local\Temp\DEC7.tmp"67⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\DF63.tmp"C:\Users\Admin\AppData\Local\Temp\DF63.tmp"68⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"C:\Users\Admin\AppData\Local\Temp\DFE0.tmp"69⤵PID:3968
-
C:\Users\Admin\AppData\Local\Temp\E07D.tmp"C:\Users\Admin\AppData\Local\Temp\E07D.tmp"70⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"C:\Users\Admin\AppData\Local\Temp\E0EA.tmp"71⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\E186.tmp"C:\Users\Admin\AppData\Local\Temp\E186.tmp"72⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\E203.tmp"C:\Users\Admin\AppData\Local\Temp\E203.tmp"73⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\E280.tmp"C:\Users\Admin\AppData\Local\Temp\E280.tmp"74⤵PID:3700
-
C:\Users\Admin\AppData\Local\Temp\E30D.tmp"C:\Users\Admin\AppData\Local\Temp\E30D.tmp"75⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\E38A.tmp"C:\Users\Admin\AppData\Local\Temp\E38A.tmp"76⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\E426.tmp"C:\Users\Admin\AppData\Local\Temp\E426.tmp"77⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\E4A3.tmp"C:\Users\Admin\AppData\Local\Temp\E4A3.tmp"78⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\E520.tmp"C:\Users\Admin\AppData\Local\Temp\E520.tmp"79⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\E5CC.tmp"C:\Users\Admin\AppData\Local\Temp\E5CC.tmp"80⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\E6A7.tmp"C:\Users\Admin\AppData\Local\Temp\E6A7.tmp"81⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\E743.tmp"C:\Users\Admin\AppData\Local\Temp\E743.tmp"82⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\E7FE.tmp"C:\Users\Admin\AppData\Local\Temp\E7FE.tmp"83⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\E8D9.tmp"C:\Users\Admin\AppData\Local\Temp\E8D9.tmp"84⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\E947.tmp"C:\Users\Admin\AppData\Local\Temp\E947.tmp"85⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"C:\Users\Admin\AppData\Local\Temp\E9C4.tmp"86⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\EA60.tmp"C:\Users\Admin\AppData\Local\Temp\EA60.tmp"87⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\EAEC.tmp"C:\Users\Admin\AppData\Local\Temp\EAEC.tmp"88⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\EB69.tmp"C:\Users\Admin\AppData\Local\Temp\EB69.tmp"89⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\EC25.tmp"C:\Users\Admin\AppData\Local\Temp\EC25.tmp"90⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"C:\Users\Admin\AppData\Local\Temp\ECA2.tmp"91⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"C:\Users\Admin\AppData\Local\Temp\ED6D.tmp"92⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"C:\Users\Admin\AppData\Local\Temp\EDFA.tmp"93⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"C:\Users\Admin\AppData\Local\Temp\EEA6.tmp"94⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\EF51.tmp"C:\Users\Admin\AppData\Local\Temp\EF51.tmp"95⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\EFEE.tmp"C:\Users\Admin\AppData\Local\Temp\EFEE.tmp"96⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\F0E8.tmp"C:\Users\Admin\AppData\Local\Temp\F0E8.tmp"97⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\F1A3.tmp"C:\Users\Admin\AppData\Local\Temp\F1A3.tmp"98⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\F26E.tmp"C:\Users\Admin\AppData\Local\Temp\F26E.tmp"99⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\F2EB.tmp"C:\Users\Admin\AppData\Local\Temp\F2EB.tmp"100⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\F388.tmp"C:\Users\Admin\AppData\Local\Temp\F388.tmp"101⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\F424.tmp"C:\Users\Admin\AppData\Local\Temp\F424.tmp"102⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\F4B0.tmp"C:\Users\Admin\AppData\Local\Temp\F4B0.tmp"103⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\F56C.tmp"C:\Users\Admin\AppData\Local\Temp\F56C.tmp"104⤵PID:4760
-
C:\Users\Admin\AppData\Local\Temp\F5F9.tmp"C:\Users\Admin\AppData\Local\Temp\F5F9.tmp"105⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\F695.tmp"C:\Users\Admin\AppData\Local\Temp\F695.tmp"106⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\F721.tmp"C:\Users\Admin\AppData\Local\Temp\F721.tmp"107⤵PID:3952
-
C:\Users\Admin\AppData\Local\Temp\F79E.tmp"C:\Users\Admin\AppData\Local\Temp\F79E.tmp"108⤵PID:4132
-
C:\Users\Admin\AppData\Local\Temp\F85A.tmp"C:\Users\Admin\AppData\Local\Temp\F85A.tmp"109⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\F8D7.tmp"C:\Users\Admin\AppData\Local\Temp\F8D7.tmp"110⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"C:\Users\Admin\AppData\Local\Temp\F9A2.tmp"111⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\FA6D.tmp"C:\Users\Admin\AppData\Local\Temp\FA6D.tmp"112⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\FAFA.tmp"C:\Users\Admin\AppData\Local\Temp\FAFA.tmp"113⤵PID:492
-
C:\Users\Admin\AppData\Local\Temp\FB86.tmp"C:\Users\Admin\AppData\Local\Temp\FB86.tmp"114⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\FC32.tmp"C:\Users\Admin\AppData\Local\Temp\FC32.tmp"115⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\FCCF.tmp"C:\Users\Admin\AppData\Local\Temp\FCCF.tmp"116⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"C:\Users\Admin\AppData\Local\Temp\FD8A.tmp"117⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\FE26.tmp"C:\Users\Admin\AppData\Local\Temp\FE26.tmp"118⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\FE94.tmp"C:\Users\Admin\AppData\Local\Temp\FE94.tmp"119⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\FF40.tmp"C:\Users\Admin\AppData\Local\Temp\FF40.tmp"120⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\FFEB.tmp"C:\Users\Admin\AppData\Local\Temp\FFEB.tmp"121⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\78.tmp"C:\Users\Admin\AppData\Local\Temp\78.tmp"122⤵PID:3280
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-